If I were asked to summarise my views on Identity and Access Management –what it is and what it will be– I would first point to the complexity involved in delivering I&AM programmes. This complexity is rooted in the normal (conventional) operations of business management of the IT support functions.
Given that IT is largely instrumental and addressed from a techno-centric perspective, it is necessarily the case that other perspectives are overlooked or simple conflated without proper analysis. My hypothesis is that I&AM –as the Security discipline which is most dependent of organisational transformation and business objectives–will never be addressed completely, efficiently and effectively without an integrated view of the Four Security Perspectives. As a summary of the core aspects of this problematic here are three slides which the reader may consider as a useful starting point.